CIS 438 WEEK 5 MIDTERM
CIS 438 Week 5 Midterm
1.
The
Gramm-Leach-Bliley Act requires financial institutions to protect consumer
financial information by complying with which of the following?
2.
Which of the
following must be protected per PCI DSS requirements?
3.
All of the
following are examples of consumer financial information except:
4.
Which of the
following statements does not apply to credit unions?
5.
The Federal
Reserve reports directly to:
6.
The
________________________ is also known as the Financial Services Modernization
Act of 1999.
7.
The _____________________
established the national banking system in the United States.
8.
HIPAA's
_____________________ provisions are designed to encourage "the
development of a health information system through the establishment of
standards and requirements for the electronic transmission of certain health
information."
9.
Which of the
following is not true about the Consolidated Omnibus Budget Reconciliation Act
of 1986?
10.
____________________
forbids a new employer's health plan from denying health coverage for some
reasons and prohibits discrimination against workers based on certain
conditions such as pregnancy.
11.
Before
____________________, many workers experienced "job lock" and were
afraid that they would lose health care benefits if they changed jobs.
12.
The state with
some of the strictest patient privacy protections is:
13.
COBRA benefits
generally last a maximum of:
14.
As defined by
HIPAA, the term "covered entities" means:
15.
All of the
following are true statements about the American legal system except:
16.
Which of the following
is not a true statement?
17.
Which of the
following is a true statement about the Court of Appeals?
18.
The
___________________ branch has the lawmaking authority of the federal
government.
19.
The role of the
U.S. Cabinet is to:
20.
Civil law
provides for the:
21.
_______________
governs the prosecution of those charged with serious offenses against public
order, such as murder.
22.
_____________________
are tools that filter offensive content.
23.
Which of the
following is not a condition of "obscenity" as defined by the U.S.
Supreme Court?
24.
The
_________________ requires schools to protect students' records.
25.
Some people
believe that COPPA requirements violate freedom of speech without censorship
guaranteed by the ______________ Amendment.
26.
The
________________________ protects the information of children online.
27.
Under FERPA,
which of the following may be disclosed in a school directory without consent?
28.
The main goal of
______________ is to protect shareholders and investors from financial fraud.
29.
Which financial
disclosure form helps investors understand the financial stability of a
company?
30.
SOX
___________imposes criminal liability for fraudulent financial certifications.
31.
The Enron
scandal and similar corporate scandals led to the creation of which of the
following?
32.
SOX ______
requires a company's executive management to report on the effectiveness of the
company's internal controls over financial reporting (ICFR).
33.
The U.S.
Securities and Exchange Commission reviews a public company's Form 10-K at
least once every ____________ years.
34.
All of the
following are types of information included on a Form 10-K except:
35.
A
____________________ is owned by many investors in the form of stock.
36.
__________________
is a body of law developed because of legal tradition and court cases.
37.
The first state
to enact anti-spyware legislation was:
38.
Types of
information that most people consider private include:
39.
What is a small
string of text that a Web site stores on a user's computer?
40.
Which of the
following is a true statement regarding privacy?
41.
Which of the
following U.S. Constitution amendments contribute to the right of privacy?
42.
What is the
source of legal authority for the U.S. government?
43.
What is
considered personally identifiable information?
44.
______________
means that only people with the right permission can access and use
information.
45.
Organizations
have a number of options for responding to risk. Common responses include which
of the following?
46.
Anything that
can cause harm to an information system is a:
47.
The likelihood
that a threat will exploit a vulnerability and cause harm is called:
48.
What is the
window of vulnerability?
49.
The main goal of
information security is to protect:
50.
_______________
is the process of reviewing known vulnerabilities and threats.
No comments:
Post a Comment